If Apple already patched then should we have seen signs of any performance hits?These stock sales need to be approved months in advance just for this purpose. It's schedule SO THAT they don't have the SEC breathing down their neck. But, the question really is, how long ago was this approved and schedule, and how long ago did Intel know about the issue? As mentioned by another, since Apple has already patched, it was known prior to it's public release.
If Apple already patched then should we have seen signs of any performance hits?
Not exactly. It can infer the contents of the memory location based on how long it takes to read information (thus detecting whether given bits are in the cache or are not, and knowing that if it is in the cache that means it corresponds to the hypothesized value). It's a side channel attack.
The NMOS 6502's indexed addressing across page boundaries will do an extra read of an invalid address. This characteristic may cause random issues by accessing hardware that acts on a read, such as clearing timer or IRQ flags, sending an I/O handshake, etc. This defect continued through the entire NMOS line, but was corrected in the CMOS derivatives, in which the processor does an extra read of the last instruction byte.
The 6502's read-modify-write instructions perform one read and two write cycles. First the unmodified data that was read is written back, and then the modified data is written. This characteristic may cause issues by twice accessing hardware that acts on a write. This anomaly continued through the entire NMOS line, but was fixed in the CMOS derivatives, in which the processor will do two reads and one write cycle. Good programming practice will generally avoid this problem by not executing read/modify/write instructions on hardware registers.
Actually, the rules regarding insider trading still apply even if you intended to make a transaction before gaining the insider knowledge. Once you become aware of the impactful knowledge, you are forbidden from making transactions until after the information is publicly disseminated.Sounds like this may lead to an SEC investigation for insider trading. Given that Apple's 10.13.2 update reportedly patches many of these flaws. It is reasonable to conclude Intel has had some knowledge of this issue for a while.
Edit: The timing of the sale is bad. It doesn't necessarily mean intent was involved.
It was more like a, "Wait -- so you can trick it into doing what now? Did anybody expect this?"Was this a genuine security flaw or something that was intentionally put in to provide back channel and only acknowledged now
I am. Want to know what I am exactly buying.So if I was in the market for a personal computer, why would I buy an Intel chip before a re-design? I wonder what this is going to do to price of current stock, that is, how far the discounts will go. A possible 30% decrease in performance is nothing to sneeze at, especially at i7 prices.
Any time people think they can add a few bucks to their bank account without working for it, they’ll jump right on it and convince themselves of its validity. Sometimes even exploiting a dead relative puts icing on that cake.For all those claiming there will be a massive class action suit, what grounds do you believe it'll be filed on?
I predict any such attempt will be a huge failure.
Strange how many of these CEOs manage to "unfortunately" sell their stock right before some bad news comes out
Who else remembers the Equifax CTO and CEO selling millions of dollars worth of stock just before the news of the massive data breach came out at the end of last year?
These guys have access to inside information months before it becomes public. Easy to say it was a long-planned sale and nothing to do with the bad news
I would sell it now at a profit... once the media picks up that Spectre affects their chips I think that might change.Wondered why my AMD stock started shooting up yesterday. Explains a lot.
No they didnt "copy" Intel entered into a cross-licensing agreement with AMD, licensing to AMD their patents on existing x86 techniques, and licensing from AMD their patents on techniques used in x86-64.
AMD said there's near zero risk at this time, and from the metaphor I've seen describing this exploit, it indeed seems very difficult to take advantage of.I would sell it now at a profit... once the media picks up that Spectre affects their chips I think that might change.
AMD said there's near zero risk at this time, and from the metaphor I've seen describing this exploit, it indeed seems very difficult to take advantage of.
I am not so sure about that given the description in this case.Sure, but mere difficulty is not impossibility, and given the immense benefits that would accrue to anyone who successfully implements an attack, you should assume that someone will.
To me, it is quite clearly a bug! The CPU will read a location it is not allowed to read. The Meltdown demonstration reads memory.
Further, a non malicious but buggy program could affect the system when it crashes. It might do a random read of a location that affects something (like above.)
I think I actually saw an iBook among Amazon's best sellers today.So should I buy a G4 Mac again or is Leopard too full of security bugs by ahem modern standards?
It is most likely a difficult hack to pull off, but that doesn't change the fact that AMD chips are susceptible to Spectre... I read this from their own press release. https://www.amd.com/en/corporate/speculative-executionAMD said there's near zero risk at this time, and from the metaphor I've seen describing this exploit, it indeed seems very difficult to take advantage of.
Time to dust off that old Amigas ...At least those running DOS 6 and Windows 3.1 on a 486 are safe.
I wish I had your optimism, but we're doing some language processing that chews through CPU cycles, writing massive amounts of data to queues in a high availability/replicated VM cluster, and storing the processed data in a database. In the last 24 hours, our business model has literally become "Lets gets screwed by Intel".![]()
Any chance you could flesh this answer out a bit?The hybrid design makes no difference.